{"id":"4e789e24-ce98-4bd8-bc11-b25fef1b9abb","shortId":"mnnmy4","kind":"skill","title":"azure-identity-java","tagline":"Authenticate Java applications with Azure services using Microsoft Entra ID (Azure AD).","description":"# Azure Identity (Java)\n\nAuthenticate Java applications with Azure services using Microsoft Entra ID (Azure AD).\n\n## Installation\n\n```xml\n<dependency>\n    <groupId>com.azure</groupId>\n    <artifactId>azure-identity</artifactId>\n    <version>1.15.0</version>\n</dependency>\n```\n\n## Key Concepts\n\n| Credential | Use Case |\n|------------|----------|\n| `DefaultAzureCredential` | **Recommended** - Works in dev and production |\n| `ManagedIdentityCredential` | Azure-hosted apps (App Service, Functions, VMs) |\n| `EnvironmentCredential` | CI/CD pipelines with env vars |\n| `ClientSecretCredential` | Service principals with secret |\n| `ClientCertificateCredential` | Service principals with certificate |\n| `AzureCliCredential` | Local dev using `az login` |\n| `InteractiveBrowserCredential` | Interactive login flow |\n| `DeviceCodeCredential` | Headless device authentication |\n\n## DefaultAzureCredential (Recommended)\n\nThe `DefaultAzureCredential` tries multiple authentication methods in order:\n\n1. Environment variables\n2. Workload Identity\n3. Managed Identity\n4. Azure CLI\n5. Azure PowerShell\n6. Azure Developer CLI\n\n```java\nimport com.azure.identity.DefaultAzureCredential;\nimport com.azure.identity.DefaultAzureCredentialBuilder;\n\n// Simple usage\nDefaultAzureCredential credential = new DefaultAzureCredentialBuilder().build();\n\n// Use with any Azure client\nBlobServiceClient blobClient = new BlobServiceClientBuilder()\n    .endpoint(\"https://<storage-account>.blob.core.windows.net\")\n    .credential(credential)\n    .buildClient();\n\nKeyClient keyClient = new KeyClientBuilder()\n    .vaultUrl(\"https://<vault-name>.vault.azure.net\")\n    .credential(credential)\n    .buildClient();\n```\n\n### Configure DefaultAzureCredential\n\n```java\nDefaultAzureCredential credential = new DefaultAzureCredentialBuilder()\n    .managedIdentityClientId(\"<user-assigned-identity-client-id>\")  // For user-assigned MI\n    .tenantId(\"<tenant-id>\")                                        // Limit to specific tenant\n    .excludeEnvironmentCredential()                                 // Skip env vars\n    .excludeAzureCliCredential()                                    // Skip Azure CLI\n    .build();\n```\n\n## Managed Identity\n\nFor Azure-hosted applications (App Service, Functions, AKS, VMs).\n\n```java\nimport com.azure.identity.ManagedIdentityCredential;\nimport com.azure.identity.ManagedIdentityCredentialBuilder;\n\n// System-assigned managed identity\nManagedIdentityCredential credential = new ManagedIdentityCredentialBuilder()\n    .build();\n\n// User-assigned managed identity (by client ID)\nManagedIdentityCredential credential = new ManagedIdentityCredentialBuilder()\n    .clientId(\"<user-assigned-client-id>\")\n    .build();\n\n// User-assigned managed identity (by resource ID)\nManagedIdentityCredential credential = new ManagedIdentityCredentialBuilder()\n    .resourceId(\"/subscriptions/<sub>/resourceGroups/<rg>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<name>\")\n    .build();\n```\n\n## Service Principal with Secret\n\n```java\nimport com.azure.identity.ClientSecretCredential;\nimport com.azure.identity.ClientSecretCredentialBuilder;\n\nClientSecretCredential credential = new ClientSecretCredentialBuilder()\n    .tenantId(\"<tenant-id>\")\n    .clientId(\"<client-id>\")\n    .clientSecret(\"<client-secret>\")\n    .build();\n```\n\n## Service Principal with Certificate\n\n```java\nimport com.azure.identity.ClientCertificateCredential;\nimport com.azure.identity.ClientCertificateCredentialBuilder;\n\n// From PEM file\nClientCertificateCredential credential = new ClientCertificateCredentialBuilder()\n    .tenantId(\"<tenant-id>\")\n    .clientId(\"<client-id>\")\n    .pemCertificate(\"<path-to-cert.pem>\")\n    .build();\n\n// From PFX file with password\nClientCertificateCredential credential = new ClientCertificateCredentialBuilder()\n    .tenantId(\"<tenant-id>\")\n    .clientId(\"<client-id>\")\n    .pfxCertificate(\"<path-to-cert.pfx>\", \"<pfx-password>\")\n    .build();\n\n// Send certificate chain for SNI\nClientCertificateCredential credential = new ClientCertificateCredentialBuilder()\n    .tenantId(\"<tenant-id>\")\n    .clientId(\"<client-id>\")\n    .pemCertificate(\"<path-to-cert.pem>\")\n    .sendCertificateChain(true)\n    .build();\n```\n\n## Environment Credential\n\nReads credentials from environment variables.\n\n```java\nimport com.azure.identity.EnvironmentCredential;\nimport com.azure.identity.EnvironmentCredentialBuilder;\n\nEnvironmentCredential credential = new EnvironmentCredentialBuilder().build();\n```\n\n### Required Environment Variables\n\n**For service principal with secret:**\n```bash\nAZURE_TENANT_ID=<tenant-id>\nAZURE_CLIENT_ID=<client-id>\nAZURE_CLIENT_SECRET=<client-secret>\n```\n\n**For service principal with certificate:**\n```bash\nAZURE_TENANT_ID=<tenant-id>\nAZURE_CLIENT_ID=<client-id>\nAZURE_CLIENT_CERTIFICATE_PATH=/path/to/cert.pem\nAZURE_CLIENT_CERTIFICATE_PASSWORD=<optional-password>\n```\n\n**For username/password:**\n```bash\nAZURE_TENANT_ID=<tenant-id>\nAZURE_CLIENT_ID=<client-id>\nAZURE_USERNAME=<username>\nAZURE_PASSWORD=<password>\n```\n\n## Azure CLI Credential\n\nFor local development using `az login`.\n\n```java\nimport com.azure.identity.AzureCliCredential;\nimport com.azure.identity.AzureCliCredentialBuilder;\n\nAzureCliCredential credential = new AzureCliCredentialBuilder()\n    .tenantId(\"<tenant-id>\")  // Optional: specific tenant\n    .build();\n```\n\n## Interactive Browser\n\nFor desktop applications requiring user login.\n\n```java\nimport com.azure.identity.InteractiveBrowserCredential;\nimport com.azure.identity.InteractiveBrowserCredentialBuilder;\n\nInteractiveBrowserCredential credential = new InteractiveBrowserCredentialBuilder()\n    .clientId(\"<client-id>\")\n    .redirectUrl(\"http://localhost:8080\")  // Must match app registration\n    .build();\n```\n\n## Device Code\n\nFor headless devices (IoT, CLI tools).\n\n```java\nimport com.azure.identity.DeviceCodeCredential;\nimport com.azure.identity.DeviceCodeCredentialBuilder;\n\nDeviceCodeCredential credential = new DeviceCodeCredentialBuilder()\n    .clientId(\"<client-id>\")\n    .challengeConsumer(challenge -> {\n        // Display to user\n        System.out.println(challenge.getMessage());\n    })\n    .build();\n```\n\n## Chained Credential\n\nCreate custom authentication chains.\n\n```java\nimport com.azure.identity.ChainedTokenCredential;\nimport com.azure.identity.ChainedTokenCredentialBuilder;\n\nChainedTokenCredential credential = new ChainedTokenCredentialBuilder()\n    .addFirst(new ManagedIdentityCredentialBuilder().build())\n    .addLast(new AzureCliCredentialBuilder().build())\n    .build();\n```\n\n## Workload Identity (AKS)\n\nFor Azure Kubernetes Service with workload identity.\n\n```java\nimport com.azure.identity.WorkloadIdentityCredential;\nimport com.azure.identity.WorkloadIdentityCredentialBuilder;\n\n// Reads from AZURE_TENANT_ID, AZURE_CLIENT_ID, AZURE_FEDERATED_TOKEN_FILE\nWorkloadIdentityCredential credential = new WorkloadIdentityCredentialBuilder().build();\n\n// Or explicit configuration\nWorkloadIdentityCredential credential = new WorkloadIdentityCredentialBuilder()\n    .tenantId(\"<tenant-id>\")\n    .clientId(\"<client-id>\")\n    .tokenFilePath(\"/var/run/secrets/azure/tokens/azure-identity-token\")\n    .build();\n```\n\n## Token Caching\n\nEnable persistent token caching for better performance.\n\n```java\n// Enable token caching (in-memory by default)\nDefaultAzureCredential credential = new DefaultAzureCredentialBuilder()\n    .enableAccountIdentifierLogging()\n    .build();\n\n// With shared token cache (for multi-credential scenarios)\nSharedTokenCacheCredential credential = new SharedTokenCacheCredentialBuilder()\n    .clientId(\"<client-id>\")\n    .build();\n```\n\n## Sovereign Clouds\n\n```java\nimport com.azure.identity.AzureAuthorityHosts;\n\n// Azure Government\nDefaultAzureCredential govCredential = new DefaultAzureCredentialBuilder()\n    .authorityHost(AzureAuthorityHosts.AZURE_GOVERNMENT)\n    .build();\n\n// Azure China\nDefaultAzureCredential chinaCredential = new DefaultAzureCredentialBuilder()\n    .authorityHost(AzureAuthorityHosts.AZURE_CHINA)\n    .build();\n```\n\n## Error Handling\n\n```java\nimport com.azure.identity.CredentialUnavailableException;\nimport com.azure.core.exception.ClientAuthenticationException;\n\ntry {\n    DefaultAzureCredential credential = new DefaultAzureCredentialBuilder().build();\n    AccessToken token = credential.getToken(new TokenRequestContext()\n        .addScopes(\"https://management.azure.com/.default\"));\n} catch (CredentialUnavailableException e) {\n    // No credential could authenticate\n    System.out.println(\"Authentication failed: \" + e.getMessage());\n} catch (ClientAuthenticationException e) {\n    // Authentication error (wrong credentials, expired, etc.)\n    System.out.println(\"Auth error: \" + e.getMessage());\n}\n```\n\n## Logging\n\nEnable authentication logging for debugging.\n\n```java\n// Via environment variable\n// AZURE_LOG_LEVEL=verbose\n\n// Or programmatically\nDefaultAzureCredential credential = new DefaultAzureCredentialBuilder()\n    .enableAccountIdentifierLogging()  // Log account info\n    .build();\n```\n\n## Environment Variables\n\n```bash\n# DefaultAzureCredential configuration\nAZURE_TENANT_ID=<tenant-id>\nAZURE_CLIENT_ID=<client-id>\nAZURE_CLIENT_SECRET=<client-secret>\n\n# Managed Identity\nAZURE_CLIENT_ID=<user-assigned-mi-client-id>\n\n# Workload Identity (AKS)\nAZURE_FEDERATED_TOKEN_FILE=/var/run/secrets/azure/tokens/azure-identity-token\n\n# Logging\nAZURE_LOG_LEVEL=verbose\n\n# Authority host\nAZURE_AUTHORITY_HOST=https://login.microsoftonline.com/\n```\n\n## Best Practices\n\n1. **Use DefaultAzureCredential** - Works seamlessly from dev to production\n2. **Managed Identity in Production** - No secrets to manage, automatic rotation\n3. **Azure CLI for Local Dev** - Run `az login` before running your app\n4. **Least Privilege** - Grant only required permissions to service principals\n5. **Token Caching** - Enabled by default, reduces auth round-trips\n6. **Environment Variables** - Use for CI/CD, not hardcoded secrets\n\n## Credential Selection Matrix\n\n| Environment | Recommended Credential |\n|-------------|----------------------|\n| Local Development | `DefaultAzureCredential` (uses Azure CLI) |\n| Azure App Service | `DefaultAzureCredential` (uses Managed Identity) |\n| Azure Functions | `DefaultAzureCredential` (uses Managed Identity) |\n| Azure Kubernetes Service | `WorkloadIdentityCredential` |\n| Azure VMs | `DefaultAzureCredential` (uses Managed Identity) |\n| CI/CD Pipeline | `EnvironmentCredential` |\n| Desktop App | `InteractiveBrowserCredential` |\n| CLI Tool | `DeviceCodeCredential` |\n\n## Trigger Phrases\n\n- \"Azure authentication Java\", \"DefaultAzureCredential Java\"\n- \"managed identity Java\", \"service principal Java\"\n- \"Azure login Java\", \"Azure credentials Java\"\n- \"AZURE_CLIENT_ID\", \"AZURE_TENANT_ID\"\n\n## When to Use\nThis skill is applicable to execute the workflow or actions described in the overview.\n\n## Limitations\n- Use this skill only when the task clearly matches the scope described above.\n- Do not treat the output as a substitute for environment-specific validation, testing, or expert review.\n- Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.","tags":["azure","identity","java","antigravity","awesome","skills","sickn33","agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding"],"capabilities":["skill","source-sickn33","skill-azure-identity-java","topic-agent-skills","topic-agentic-skills","topic-ai-agent-skills","topic-ai-agents","topic-ai-coding","topic-ai-workflows","topic-antigravity","topic-antigravity-skills","topic-claude-code","topic-claude-code-skills","topic-codex-cli","topic-codex-skills"],"categories":["antigravity-awesome-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/sickn33/antigravity-awesome-skills/azure-identity-java","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add sickn33/antigravity-awesome-skills","source_repo":"https://github.com/sickn33/antigravity-awesome-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 34928 github stars · SKILL.md body (11,142 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-24T18:50:30.790Z","embedding":null,"createdAt":"2026-04-18T21:32:30.299Z","updatedAt":"2026-04-24T18:50:30.790Z","lastSeenAt":"2026-04-24T18:50:30.790Z","tsv":"'/.default':601 '/path/to/cert.pem':355 '/providers/microsoft.managedidentity/userassignedidentities':237 '/resourcegroups':236 '/subscriptions':235 '/var/run/secrets/azure/tokens/azure-identity-token':514,677 '1':100,691 '1.15.0':38 '2':103,700 '3':106,711 '4':109,724 '5':112,734 '6':115,745 '8080':416 'accesstoken':593 'account':648 'action':835 'ad':16,31 'addfirst':463 'addlast':467 'addscop':598 'ak':191,474,672 'app':55,56,188,419,723,767,793 'applic':7,22,187,400,829 'ask':873 'assign':165,200,210,224 'auth':623,741 'authent':5,20,89,96,452,608,610,616,628,801 'author':683,686 'authorityhost':566,576 'automat':709 'az':80,380,718 'azur':2,9,15,17,24,30,36,53,110,113,116,134,178,185,330,333,336,345,348,351,356,363,366,369,371,373,476,489,492,495,560,570,636,656,659,662,667,673,679,685,712,764,766,773,779,783,800,811,814,817,820 'azure-host':52,184 'azure-ident':35 'azure-identity-java':1 'azureauthorityhosts.azure':567,577 'azureclicredenti':76,387 'azureclicredentialbuild':390,469 'bash':329,344,362,653 'best':689 'better':523 'blob.core.windows.net':141 'blobclient':137 'blobservicecli':136 'blobserviceclientbuild':139 'boundari':881 'browser':397 'build':130,180,207,221,238,255,275,288,303,320,395,421,447,466,470,471,503,515,539,554,569,579,592,650 'buildclient':144,153 'cach':517,521,528,543,736 'case':43 'catch':602,613 'certif':75,259,290,343,353,358 'chain':291,448,453 'chainedtokencredenti':459 'chainedtokencredentialbuild':462 'challeng':441 'challenge.getmessage':446 'challengeconsum':440 'china':571,578 'chinacredenti':573 'ci/cd':61,750,789 'clarif':875 'clear':848 'cli':111,118,179,374,428,713,765,795 'client':135,214,334,337,349,352,357,367,493,660,663,668,818 'clientauthenticationexcept':614 'clientcertificatecredenti':71,268,281,294 'clientcertificatecredentialbuild':271,284,297 'clientid':220,253,273,286,299,413,439,512,553 'clientsecret':254 'clientsecretcredenti':66,248 'clientsecretcredentialbuild':251 'cloud':556 'code':423 'com.azure':34 'com.azure.core.exception.clientauthenticationexception':586 'com.azure.identity.azureauthorityhosts':559 'com.azure.identity.azureclicredential':384 'com.azure.identity.azureclicredentialbuilder':386 'com.azure.identity.chainedtokencredential':456 'com.azure.identity.chainedtokencredentialbuilder':458 'com.azure.identity.clientcertificatecredential':262 'com.azure.identity.clientcertificatecredentialbuilder':264 'com.azure.identity.clientsecretcredential':245 'com.azure.identity.clientsecretcredentialbuilder':247 'com.azure.identity.credentialunavailableexception':584 'com.azure.identity.defaultazurecredential':121 'com.azure.identity.defaultazurecredentialbuilder':123 'com.azure.identity.devicecodecredential':432 'com.azure.identity.devicecodecredentialbuilder':434 'com.azure.identity.environmentcredential':313 'com.azure.identity.environmentcredentialbuilder':315 'com.azure.identity.interactivebrowsercredential':406 'com.azure.identity.interactivebrowsercredentialbuilder':408 'com.azure.identity.managedidentitycredential':195 'com.azure.identity.managedidentitycredentialbuilder':197 'com.azure.identity.workloadidentitycredential':484 'com.azure.identity.workloadidentitycredentialbuilder':486 'concept':40 'configur':154,506,655 'could':607 'creat':450 'credenti':41,127,142,143,151,152,158,204,217,231,249,269,282,295,305,307,317,375,388,410,436,449,460,500,508,535,547,550,589,606,619,643,754,759,815 'credential.gettoken':595 'credentialunavailableexcept':603 'criteria':884 'custom':451 'debug':631 'default':533,739 'defaultazurecredenti':44,90,93,126,155,157,534,562,572,588,642,654,693,762,769,775,785,803 'defaultazurecredentialbuild':129,160,537,565,575,591,645 'describ':836,852 'desktop':399,792 'dev':48,78,697,716 'develop':117,378,761 'devic':88,422,426 'devicecodecredenti':86,435,797 'devicecodecredentialbuild':438 'display':442 'e':604,615 'e.getmessage':612,625 'enabl':518,526,627,737 'enableaccountidentifierlog':538,646 'endpoint':140 'entra':13,28 'env':64,174 'environ':101,304,309,322,634,651,746,757,864 'environment-specif':863 'environmentcredenti':60,316,791 'environmentcredentialbuild':319 'error':580,617,624 'etc':621 'excludeazureclicredenti':176 'excludeenvironmentcredenti':172 'execut':831 'expert':869 'expir':620 'explicit':505 'fail':611 'feder':496,674 'file':267,278,498,676 'flow':85 'function':58,190,774 'govcredenti':563 'govern':561,568 'grant':727 'handl':581 'hardcod':752 'headless':87,425 'host':54,186,684,687 'id':14,29,215,229,332,335,347,350,365,368,491,494,658,661,669,819,822 'ident':3,18,37,105,108,182,202,212,226,473,481,666,671,702,772,778,788,806 'import':120,122,194,196,244,246,261,263,312,314,383,385,405,407,431,433,455,457,483,485,558,583,585 'in-memori':529 'info':649 'input':878 'instal':32 'interact':83,396 'interactivebrowsercredenti':82,409,794 'interactivebrowsercredentialbuild':412 'iot':427 'java':4,6,19,21,119,156,193,243,260,311,382,404,430,454,482,525,557,582,632,802,804,807,810,813,816 'key':39 'keyclient':145,146 'keyclientbuild':148 'kubernet':477,780 'least':725 'level':638,681 'limit':168,840 'local':77,377,715,760 'localhost':415 'log':626,629,637,647,678,680 'login':81,84,381,403,719,812 'login.microsoftonline.com':688 'manag':107,181,201,211,225,665,701,708,771,777,787,805 'managedidentityclientid':161 'managedidentitycredenti':51,203,216,230 'managedidentitycredentialbuild':206,219,233,465 'management.azure.com':600 'management.azure.com/.default':599 'match':418,849 'matrix':756 'memori':531 'method':97 'mi':166 'microsoft':12,27 'miss':886 'multi':546 'multi-credenti':545 'multipl':95 'must':417 'new':128,138,147,159,205,218,232,250,270,283,296,318,389,411,437,461,464,468,501,509,536,551,564,574,590,596,644 'option':392 'order':99 'output':858 'overview':839 'password':280,359,372 'path':354 'pem':266 'pemcertif':274,300 'perform':524 'permiss':730,879 'persist':519 'pfx':277 'pfxcertif':287 'phrase':799 'pipelin':62,790 'powershel':114 'practic':690 'princip':68,73,240,257,326,341,733,809 'privileg':726 'product':50,699,704 'programmat':641 'read':306,487 'recommend':45,91,758 'redirecturl':414 'reduc':740 'registr':420 'requir':321,401,729,877 'resourc':228 'resourceid':234 'review':870 'rotat':710 'round':743 'round-trip':742 'run':717,721 'safeti':880 'scenario':548 'scope':851 'seamless':695 'secret':70,242,328,338,664,706,753 'select':755 'send':289 'sendcertificatechain':301 'servic':10,25,57,67,72,189,239,256,325,340,478,732,768,781,808 'share':541 'sharedtokencachecredenti':549 'sharedtokencachecredentialbuild':552 'simpl':124 'skill':827,843 'skill-azure-identity-java' 'skip':173,177 'sni':293 'source-sickn33' 'sovereign':555 'specif':170,393,865 'stop':871 'substitut':861 'success':883 'system':199 'system-assign':198 'system.out.println':445,609,622 'task':847 'tenant':171,331,346,364,394,490,657,821 'tenantid':167,252,272,285,298,391,511 'test':867 'token':497,516,520,527,542,594,675,735 'tokenfilepath':513 'tokenrequestcontext':597 'tool':429,796 'topic-agent-skills' 'topic-agentic-skills' 'topic-ai-agent-skills' 'topic-ai-agents' 'topic-ai-coding' 'topic-ai-workflows' 'topic-antigravity' 'topic-antigravity-skills' 'topic-claude-code' 'topic-claude-code-skills' 'topic-codex-cli' 'topic-codex-skills' 'treat':856 'tri':94,587 'trigger':798 'trip':744 'true':302 'usag':125 'use':11,26,42,79,131,379,692,748,763,770,776,786,825,841 'user':164,209,223,402,444 'user-assign':163,208,222 'usernam':370 'username/password':361 'valid':866 'var':65,175 'variabl':102,310,323,635,652,747 'vault.azure.net':150 'vaulturl':149 'verbos':639,682 'via':633 'vms':59,192,784 'work':46,694 'workflow':833 'workload':104,472,480,670 'workloadidentitycredenti':499,507,782 'workloadidentitycredentialbuild':502,510 'wrong':618 'xml':33","prices":[{"id":"d7ac6e63-b6a7-4529-835a-3da90687329f","listingId":"4e789e24-ce98-4bd8-bc11-b25fef1b9abb","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"sickn33","category":"antigravity-awesome-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:32:30.299Z"}],"sources":[{"listingId":"4e789e24-ce98-4bd8-bc11-b25fef1b9abb","source":"github","sourceId":"sickn33/antigravity-awesome-skills/azure-identity-java","sourceUrl":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/azure-identity-java","isPrimary":false,"firstSeenAt":"2026-04-18T21:32:30.299Z","lastSeenAt":"2026-04-24T18:50:30.790Z"}],"details":{"listingId":"4e789e24-ce98-4bd8-bc11-b25fef1b9abb","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"sickn33","slug":"azure-identity-java","github":{"repo":"sickn33/antigravity-awesome-skills","stars":34928,"topics":["agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows","antigravity","antigravity-skills","claude-code","claude-code-skills","codex-cli","codex-skills","cursor","cursor-skills","developer-tools","gemini-cli","gemini-skills","kiro","mcp","skill-library"],"license":"mit","html_url":"https://github.com/sickn33/antigravity-awesome-skills","pushed_at":"2026-04-24T06:41:17Z","description":"Installable GitHub library of 1,400+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections.","skill_md_sha":"fe0eeaa8ca08a66a1b4dcc268fc8c40baa9f8ebf","skill_md_path":"skills/azure-identity-java/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/azure-identity-java"},"layout":"multi","source":"github","category":"antigravity-awesome-skills","frontmatter":{"name":"azure-identity-java","description":"Authenticate Java applications with Azure services using Microsoft Entra ID (Azure AD)."},"skills_sh_url":"https://skills.sh/sickn33/antigravity-awesome-skills/azure-identity-java"},"updatedAt":"2026-04-24T18:50:30.790Z"}}